CORE
🇺🇦
make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
Strengthen user authentication on mobile devices by using user’s touch dynamics pattern
Authors
WH Khoh
R Nawaz
+4 more
Q Shi
SY Tan
PS Teh
N Zhang
Publication date
24 December 2019
Publisher
'Springer Science and Business Media LLC'
Doi
Cite
Abstract
Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and access private and sensitive data or services, and this has led to an increased demand for more secure and usable security services, one of which is user authentication. Currently, mobile device authentication services mainly use a knowledge-based method, e.g. a PIN-based authentication method, and, in some cases, a fingerprint-based authentication method is also supported. The knowledge-based method is vulnerable to impersonation attacks, while the fingerprint-based method can be unreliable sometimes. To overcome these limitations and to make the authentication service more secure and reliable for touch screen mobile device users, we have investigated the use of touch dynamics biometrics as a mobile device authentication solution by designing, implementing and evaluating a touch dynamics authentication method. This paper describes the design, implementation, and evaluation of this method, the acquisition of raw touch dynamics data, the use of the raw data to obtain touch dynamics features, and the training of the features to build an authentication model for user identity verification. The evaluation results show that by integrating the touch dynamics authentication method into the PIN-based authentication method, the protection levels against impersonation attacks is greatly enhanced. For example, if a PIN is compromised, the success rate of an impersonation attempt is drastically reduced from 100% (if only a 4-digit PIN is used) to 9.9% (if both the PIN and the touch dynamics are used). © 2019, The Author(s)
Similar works
Full text
Open in the Core reader
Download PDF
Available Versions
SHDL@MMU Digital Repository
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:shdl.mmu.edu.my:8216
Last time updated on 20/10/2021
E-space: Manchester Metropolitan University's Research Repository
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:e-space.mmu.ac.uk:624667
Last time updated on 03/01/2020
LJMU Research Online (Liverpool John Moores University)
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:researchonline.ljmu.ac.uk:...
Last time updated on 26/03/2020
The University of Manchester - Institutional Repository
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:pure.atira.dk:publications...
Last time updated on 04/01/2020